29cd25be1d
BUG= R=titzer@chromium.org Review URL: https://codereview.chromium.org/1776923005 Cr-Commit-Position: refs/heads/master@{#34639}
1168 lines
35 KiB
C++
1168 lines
35 KiB
C++
// Copyright 2015 the V8 project authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "test/unittests/test-utils.h"
|
|
|
|
#include "src/wasm/module-decoder.h"
|
|
#include "src/wasm/wasm-macro-gen.h"
|
|
#include "src/wasm/wasm-opcodes.h"
|
|
|
|
namespace v8 {
|
|
namespace internal {
|
|
namespace wasm {
|
|
|
|
#define EMPTY_FUNCTION(sig_index) 0, SIG_INDEX(sig_index), U16_LE(0)
|
|
#define VOID_VOID_SIG 0, kLocalVoid
|
|
#define INT_INT_SIG 1, kLocalI32, kLocalI32
|
|
|
|
#define EXPECT_VERIFIES(data) \
|
|
do { \
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data)); \
|
|
EXPECT_TRUE(result.ok()); \
|
|
if (result.val) delete result.val; \
|
|
} while (false)
|
|
|
|
#define EXPECT_FAILURE_LEN(data, length) \
|
|
do { \
|
|
ModuleResult result = DecodeModule(data, data + length); \
|
|
EXPECT_FALSE(result.ok()); \
|
|
if (result.val) delete result.val; \
|
|
} while (false)
|
|
|
|
#define EXPECT_FAILURE(data) EXPECT_FAILURE_LEN(data, sizeof(data))
|
|
|
|
#define EXPECT_OFF_END_FAILURE(data, min, max) \
|
|
do { \
|
|
for (size_t length = min; length < max; length++) { \
|
|
EXPECT_FAILURE_LEN(data, length); \
|
|
} \
|
|
} while (false)
|
|
|
|
struct LocalTypePair {
|
|
uint8_t code;
|
|
LocalType type;
|
|
} kLocalTypes[] = {{kLocalI32, kAstI32},
|
|
{kLocalI64, kAstI64},
|
|
{kLocalF32, kAstF32},
|
|
{kLocalF64, kAstF64}};
|
|
|
|
class WasmModuleVerifyTest : public TestWithZone {
|
|
public:
|
|
ModuleResult DecodeModule(const byte* module_start, const byte* module_end) {
|
|
// Add the WASM magic and version number automatically.
|
|
size_t size = static_cast<size_t>(module_end - module_start);
|
|
byte header[] = {WASM_MODULE_HEADER};
|
|
size_t total = sizeof(header) + size;
|
|
auto temp = new byte[total];
|
|
memcpy(temp, header, sizeof(header));
|
|
memcpy(temp + sizeof(header), module_start, size);
|
|
ModuleResult result = DecodeWasmModule(nullptr, zone(), temp, temp + total,
|
|
false, kWasmOrigin);
|
|
delete[] temp;
|
|
return result;
|
|
}
|
|
ModuleResult DecodeModuleNoHeader(const byte* module_start,
|
|
const byte* module_end) {
|
|
return DecodeWasmModule(nullptr, zone(), module_start, module_end, false,
|
|
kWasmOrigin);
|
|
}
|
|
};
|
|
|
|
TEST_F(WasmModuleVerifyTest, WrongMagic) {
|
|
for (uint32_t x = 1; x; x <<= 1) {
|
|
const byte data[] = {U32_LE(kWasmMagic ^ x), U32_LE(kWasmVersion),
|
|
kDeclEnd};
|
|
ModuleResult result = DecodeModuleNoHeader(data, data + sizeof(data));
|
|
EXPECT_FALSE(result.ok());
|
|
if (result.val) delete result.val;
|
|
}
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, WrongVersion) {
|
|
for (uint32_t x = 1; x; x <<= 1) {
|
|
const byte data[] = {U32_LE(kWasmMagic), U32_LE(kWasmVersion ^ x),
|
|
kDeclEnd};
|
|
ModuleResult result = DecodeModuleNoHeader(data, data + sizeof(data));
|
|
EXPECT_FALSE(result.ok());
|
|
if (result.val) delete result.val;
|
|
}
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, DecodeEmpty) {
|
|
static const byte data[] = {kDeclEnd};
|
|
EXPECT_VERIFIES(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, OneGlobal) {
|
|
static const byte data[] = {
|
|
kDeclGlobals,
|
|
1,
|
|
NAME_LENGTH(1), 'g', // name
|
|
kMemI32, // memory type
|
|
0, // exported
|
|
};
|
|
|
|
{
|
|
// Should decode to exactly one global.
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
EXPECT_EQ(1, result.val->globals.size());
|
|
EXPECT_EQ(0, result.val->functions.size());
|
|
EXPECT_EQ(0, result.val->data_segments.size());
|
|
|
|
WasmGlobal* global = &result.val->globals.back();
|
|
|
|
EXPECT_EQ(1, global->name_length);
|
|
EXPECT_EQ(MachineType::Int32(), global->type);
|
|
EXPECT_EQ(0, global->offset);
|
|
EXPECT_FALSE(global->exported);
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
EXPECT_OFF_END_FAILURE(data, 1, sizeof(data));
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, ZeroGlobals) {
|
|
static const byte data[] = {
|
|
kDeclGlobals, 0, // declare 0 globals
|
|
};
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
|
|
static void AppendUint32v(std::vector<byte>& buffer, uint32_t val) {
|
|
while (true) {
|
|
uint32_t next = val >> 7;
|
|
uint32_t out = val & 0x7f;
|
|
if (next) {
|
|
buffer.push_back(static_cast<byte>(0x80 | out));
|
|
val = next;
|
|
} else {
|
|
buffer.push_back(static_cast<byte>(out));
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, NGlobals) {
|
|
static const byte data[] = {
|
|
NO_NAME, // name length
|
|
kMemI32, // memory type
|
|
0, // exported
|
|
};
|
|
|
|
for (uint32_t i = 0; i < 1000000; i = i * 13 + 1) {
|
|
std::vector<byte> buffer;
|
|
buffer.push_back(kDeclGlobals);
|
|
AppendUint32v(buffer, i);
|
|
for (uint32_t j = 0; j < i; j++) {
|
|
buffer.insert(buffer.end(), data, data + sizeof(data));
|
|
}
|
|
|
|
ModuleResult result = DecodeModule(&buffer[0], &buffer[0] + buffer.size());
|
|
EXPECT_TRUE(result.ok());
|
|
if (result.val) delete result.val;
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, GlobalWithInvalidMemoryType) {
|
|
static const byte data[] = {
|
|
kDeclGlobals,
|
|
1, // declare one global
|
|
NO_NAME, // name length
|
|
33, // memory type
|
|
0, // exported
|
|
};
|
|
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, TwoGlobals) {
|
|
static const byte data[] = {
|
|
kDeclGlobals,
|
|
2,
|
|
NO_NAME, // #0: name length
|
|
kMemF32, // memory type
|
|
0, // exported
|
|
NO_NAME, // #1: name length
|
|
kMemF64, // memory type
|
|
1, // exported
|
|
};
|
|
|
|
{
|
|
// Should decode to exactly two globals.
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
EXPECT_EQ(2, result.val->globals.size());
|
|
EXPECT_EQ(0, result.val->functions.size());
|
|
EXPECT_EQ(0, result.val->data_segments.size());
|
|
|
|
WasmGlobal* g0 = &result.val->globals[0];
|
|
WasmGlobal* g1 = &result.val->globals[1];
|
|
|
|
EXPECT_EQ(0, g0->name_length);
|
|
EXPECT_EQ(MachineType::Float32(), g0->type);
|
|
EXPECT_EQ(0, g0->offset);
|
|
EXPECT_FALSE(g0->exported);
|
|
|
|
EXPECT_EQ(0, g1->name_length);
|
|
EXPECT_EQ(MachineType::Float64(), g1->type);
|
|
EXPECT_EQ(0, g1->offset);
|
|
EXPECT_TRUE(g1->exported);
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
EXPECT_OFF_END_FAILURE(data, 1, sizeof(data));
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, OneSignature) {
|
|
{
|
|
static const byte data[] = {kDeclSignatures, 1, VOID_VOID_SIG};
|
|
EXPECT_VERIFIES(data);
|
|
}
|
|
|
|
{
|
|
static const byte data[] = {kDeclSignatures, 1, INT_INT_SIG};
|
|
EXPECT_VERIFIES(data);
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, MultipleSignatures) {
|
|
static const byte data[] = {
|
|
kDeclSignatures,
|
|
3,
|
|
0,
|
|
kLocalVoid, // void -> void
|
|
1,
|
|
kLocalI32,
|
|
kLocalF32, // f32 -> i32
|
|
2,
|
|
kLocalI32,
|
|
kLocalF64,
|
|
kLocalF64, // (f64,f64) -> i32
|
|
};
|
|
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
EXPECT_EQ(3, result.val->signatures.size());
|
|
if (result.val->signatures.size() == 3) {
|
|
EXPECT_EQ(0, result.val->signatures[0]->return_count());
|
|
EXPECT_EQ(1, result.val->signatures[1]->return_count());
|
|
EXPECT_EQ(1, result.val->signatures[2]->return_count());
|
|
|
|
EXPECT_EQ(0, result.val->signatures[0]->parameter_count());
|
|
EXPECT_EQ(1, result.val->signatures[1]->parameter_count());
|
|
EXPECT_EQ(2, result.val->signatures[2]->parameter_count());
|
|
}
|
|
if (result.val) delete result.val;
|
|
|
|
EXPECT_OFF_END_FAILURE(data, 1, sizeof(data));
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, FunctionWithoutSig) {
|
|
static const byte data[] = {
|
|
kDeclFunctions, 1,
|
|
// func#0 ------------------------------------------------------
|
|
SIG_INDEX(0), // signature index
|
|
NO_NAME, // name length
|
|
U32_LE(0), // code start offset
|
|
U32_LE(0), // code end offset
|
|
U16_LE(899), // local int32 count
|
|
U16_LE(799), // local int64 count
|
|
U16_LE(699), // local float32 count
|
|
U16_LE(599), // local float64 count
|
|
0, // exported
|
|
1 // external
|
|
};
|
|
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_FALSE(result.ok());
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, OneEmptyVoidVoidFunction) {
|
|
const int kCodeStartOffset = 30;
|
|
const int kCodeEndOffset = kCodeStartOffset + 1;
|
|
|
|
static const byte data[] = {
|
|
kDeclSignatures, 1,
|
|
// sig#0 -------------------------------------------------------
|
|
VOID_VOID_SIG,
|
|
// func#0 ------------------------------------------------------
|
|
kDeclFunctions, 1,
|
|
kDeclFunctionLocals | kDeclFunctionExport | kDeclFunctionName,
|
|
SIG_INDEX(0), // signature index
|
|
NAME_LENGTH(2), 'h', 'i', // name
|
|
U16_LE(1466), // local int32 count
|
|
U16_LE(1355), // local int64 count
|
|
U16_LE(1244), // local float32 count
|
|
U16_LE(1133), // local float64 count
|
|
1, 0, // size
|
|
kExprNop,
|
|
};
|
|
|
|
{
|
|
// Should decode to exactly one function.
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
EXPECT_EQ(0, result.val->globals.size());
|
|
EXPECT_EQ(1, result.val->signatures.size());
|
|
EXPECT_EQ(1, result.val->functions.size());
|
|
EXPECT_EQ(0, result.val->data_segments.size());
|
|
EXPECT_EQ(0, result.val->function_table.size());
|
|
|
|
WasmFunction* function = &result.val->functions.back();
|
|
|
|
EXPECT_EQ(18, function->name_offset);
|
|
EXPECT_EQ(2, function->name_length);
|
|
EXPECT_EQ(kCodeStartOffset, function->code_start_offset);
|
|
EXPECT_EQ(kCodeEndOffset, function->code_end_offset);
|
|
|
|
EXPECT_EQ(1466, function->local_i32_count);
|
|
EXPECT_EQ(1355, function->local_i64_count);
|
|
EXPECT_EQ(1244, function->local_f32_count);
|
|
EXPECT_EQ(1133, function->local_f64_count);
|
|
|
|
EXPECT_TRUE(function->exported);
|
|
EXPECT_FALSE(function->external);
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
EXPECT_OFF_END_FAILURE(data, 5, sizeof(data));
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, OneFunctionImported) {
|
|
static const byte data[] = {
|
|
kDeclSignatures, 1,
|
|
// sig#0 -------------------------------------------------------
|
|
VOID_VOID_SIG, kDeclFunctions, 1,
|
|
// func#0 ------------------------------------------------------
|
|
kDeclFunctionImport, // no name, no locals, imported
|
|
SIG_INDEX(0),
|
|
};
|
|
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
EXPECT_EQ(1, result.val->functions.size());
|
|
WasmFunction* function = &result.val->functions.back();
|
|
|
|
EXPECT_EQ(0, function->name_length);
|
|
EXPECT_EQ(0, function->code_start_offset);
|
|
EXPECT_EQ(0, function->code_end_offset);
|
|
|
|
EXPECT_EQ(0, function->local_i32_count);
|
|
EXPECT_EQ(0, function->local_i64_count);
|
|
EXPECT_EQ(0, function->local_f32_count);
|
|
EXPECT_EQ(0, function->local_f64_count);
|
|
|
|
EXPECT_FALSE(function->exported);
|
|
EXPECT_TRUE(function->external);
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, OneFunctionWithNopBody) {
|
|
static const byte kCodeStartOffset = 19;
|
|
static const byte kCodeEndOffset = kCodeStartOffset + 1;
|
|
|
|
static const byte data[] = {
|
|
kDeclSignatures, 1,
|
|
// sig#0 -------------------------------------------------------
|
|
0, 0, // void -> void
|
|
kDeclFunctions, 1,
|
|
// func#0 ------------------------------------------------------
|
|
0, // no name, no locals
|
|
0, 0, // signature index
|
|
1, 0, // body size
|
|
kExprNop // body
|
|
};
|
|
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
EXPECT_EQ(1, result.val->functions.size());
|
|
WasmFunction* function = &result.val->functions.back();
|
|
|
|
EXPECT_EQ(0, function->name_length);
|
|
EXPECT_EQ(kCodeStartOffset, function->code_start_offset);
|
|
EXPECT_EQ(kCodeEndOffset, function->code_end_offset);
|
|
|
|
EXPECT_EQ(0, function->local_i32_count);
|
|
EXPECT_EQ(0, function->local_i64_count);
|
|
EXPECT_EQ(0, function->local_f32_count);
|
|
EXPECT_EQ(0, function->local_f64_count);
|
|
|
|
EXPECT_FALSE(function->exported);
|
|
EXPECT_FALSE(function->external);
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, OneFunctionWithNopBody_WithLocals) {
|
|
static const byte kCodeStartOffset = 27;
|
|
static const byte kCodeEndOffset = kCodeStartOffset + 1;
|
|
|
|
static const byte data[] = {
|
|
kDeclSignatures, 1,
|
|
// sig#0 -------------------------------------------------------
|
|
0, 0, // void -> void
|
|
kDeclFunctions, 1,
|
|
// func#0 ------------------------------------------------------
|
|
kDeclFunctionLocals, 0, 0, // signature index
|
|
1, 2, // local int32 count
|
|
3, 4, // local int64 count
|
|
5, 6, // local float32 count
|
|
7, 8, // local float64 count
|
|
1, 0, // body size
|
|
kExprNop // body
|
|
};
|
|
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
EXPECT_EQ(1, result.val->functions.size());
|
|
WasmFunction* function = &result.val->functions.back();
|
|
|
|
EXPECT_EQ(0, function->name_length);
|
|
EXPECT_EQ(kCodeStartOffset, function->code_start_offset);
|
|
EXPECT_EQ(kCodeEndOffset, function->code_end_offset);
|
|
|
|
EXPECT_EQ(513, function->local_i32_count);
|
|
EXPECT_EQ(1027, function->local_i64_count);
|
|
EXPECT_EQ(1541, function->local_f32_count);
|
|
EXPECT_EQ(2055, function->local_f64_count);
|
|
|
|
EXPECT_FALSE(function->exported);
|
|
EXPECT_FALSE(function->external);
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, OneGlobalOneFunctionWithNopBodyOneDataSegment) {
|
|
static const byte kCodeStartOffset = 8 + 4 + 5 + 4 + 18;
|
|
static const byte kCodeEndOffset = kCodeStartOffset + 3;
|
|
static const byte kDataSegmentSourceOffset = kCodeEndOffset + 6;
|
|
|
|
static const byte data[] = {
|
|
kDeclMemory, 28, 28, 1,
|
|
// global#0 --------------------------------------------------
|
|
kDeclGlobals, 1, 0, // name length
|
|
kMemU8, // memory type
|
|
0, // exported
|
|
// sig#0 -----------------------------------------------------
|
|
kDeclSignatures, 1, 0, 0, // void -> void
|
|
// func#0 ----------------------------------------------------
|
|
kDeclFunctions, 1, kDeclFunctionLocals | kDeclFunctionName, 0,
|
|
0, // signature index
|
|
2, 'h', 'i', // name
|
|
1, 2, // local int32 count
|
|
3, 4, // local int64 count
|
|
5, 6, // local float32 count
|
|
7, 8, // local float64 count
|
|
3, 0, // body size
|
|
kExprNop, // func#0 body
|
|
kExprNop, // func#0 body
|
|
kExprNop, // func#0 body
|
|
// segment#0 -------------------------------------------------
|
|
kDeclDataSegments, 1, U32V_3(0x8b3ae), // dest addr
|
|
U32V_1(5), // source size
|
|
0, 1, 2, 3, 4, // data bytes
|
|
// rest ------------------------------------------------------
|
|
kDeclEnd,
|
|
};
|
|
|
|
{
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
EXPECT_EQ(1, result.val->globals.size());
|
|
EXPECT_EQ(1, result.val->functions.size());
|
|
EXPECT_EQ(1, result.val->data_segments.size());
|
|
|
|
WasmGlobal* global = &result.val->globals.back();
|
|
|
|
EXPECT_EQ(0, global->name_length);
|
|
EXPECT_EQ(MachineType::Uint8(), global->type);
|
|
EXPECT_EQ(0, global->offset);
|
|
EXPECT_FALSE(global->exported);
|
|
|
|
WasmFunction* function = &result.val->functions.back();
|
|
|
|
EXPECT_EQ(27, function->name_offset);
|
|
EXPECT_EQ(2, function->name_length);
|
|
EXPECT_EQ(kCodeStartOffset, function->code_start_offset);
|
|
EXPECT_EQ(kCodeEndOffset, function->code_end_offset);
|
|
|
|
EXPECT_FALSE(function->exported);
|
|
EXPECT_FALSE(function->external);
|
|
|
|
WasmDataSegment* segment = &result.val->data_segments.back();
|
|
|
|
EXPECT_EQ(0x8b3ae, segment->dest_addr);
|
|
EXPECT_EQ(kDataSegmentSourceOffset, segment->source_offset);
|
|
EXPECT_EQ(5, segment->source_size);
|
|
EXPECT_TRUE(segment->init);
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, OneDataSegment) {
|
|
const byte kDataSegmentSourceOffset = 8 + 10;
|
|
const byte data[] = {
|
|
kDeclMemory, 28, 28, 1,
|
|
kDeclDataSegments, 1,
|
|
U32V_3(0x9bbaa), // dest addr
|
|
U32V_1(3), // source size
|
|
'a', 'b', 'c' // data bytes
|
|
};
|
|
|
|
{
|
|
EXPECT_VERIFIES(data);
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
EXPECT_EQ(0, result.val->globals.size());
|
|
EXPECT_EQ(0, result.val->functions.size());
|
|
EXPECT_EQ(1, result.val->data_segments.size());
|
|
|
|
WasmDataSegment* segment = &result.val->data_segments.back();
|
|
|
|
EXPECT_EQ(0x9bbaa, segment->dest_addr);
|
|
EXPECT_EQ(kDataSegmentSourceOffset, segment->source_offset);
|
|
EXPECT_EQ(3, segment->source_size);
|
|
EXPECT_TRUE(segment->init);
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
EXPECT_OFF_END_FAILURE(data, 5, sizeof(data));
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, TwoDataSegments) {
|
|
const byte kDataSegment0SourceOffset = 8 + 10;
|
|
const byte kDataSegment1SourceOffset = 8 + 10 + 8;
|
|
|
|
const byte data[] = {
|
|
kDeclMemory, 28, 28, 1,
|
|
kDeclDataSegments, 2,
|
|
U32V_3(0x7ffee), // #0: dest addr
|
|
U32V_1(4), // source size
|
|
1, 2, 3, 4, // data bytes
|
|
U32V_3(0x6ddcc), // #1: dest addr
|
|
U32V_1(10), // source size
|
|
1, 2, 3, 4, 5, 6, 7, 8, 9, 10 // data bytes
|
|
};
|
|
|
|
{
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
EXPECT_EQ(0, result.val->globals.size());
|
|
EXPECT_EQ(0, result.val->functions.size());
|
|
EXPECT_EQ(2, result.val->data_segments.size());
|
|
|
|
WasmDataSegment* s0 = &result.val->data_segments[0];
|
|
WasmDataSegment* s1 = &result.val->data_segments[1];
|
|
|
|
EXPECT_EQ(0x7ffee, s0->dest_addr);
|
|
EXPECT_EQ(kDataSegment0SourceOffset, s0->source_offset);
|
|
EXPECT_EQ(4, s0->source_size);
|
|
EXPECT_TRUE(s0->init);
|
|
|
|
EXPECT_EQ(0x6ddcc, s1->dest_addr);
|
|
EXPECT_EQ(kDataSegment1SourceOffset, s1->source_offset);
|
|
EXPECT_EQ(10, s1->source_size);
|
|
EXPECT_TRUE(s1->init);
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
EXPECT_OFF_END_FAILURE(data, 5, sizeof(data));
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, DataSegmentWithInvalidDest) {
|
|
const int source_size = 3;
|
|
|
|
for (byte mem_pages = 1; mem_pages < 16; mem_pages++) {
|
|
int mem_size = mem_pages * 0x10000; // 64k pages.
|
|
|
|
for (int dest_addr = mem_size - source_size;
|
|
dest_addr < mem_size + source_size; dest_addr++) {
|
|
byte data[] = {
|
|
kDeclMemory,
|
|
mem_pages,
|
|
mem_pages,
|
|
1,
|
|
kDeclDataSegments,
|
|
1,
|
|
U32V_3(dest_addr),
|
|
U32V_1(source_size),
|
|
'a', 'b', 'c'
|
|
};
|
|
|
|
if (dest_addr <= (mem_size - source_size)) {
|
|
EXPECT_VERIFIES(data);
|
|
} else {
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
// To make below tests for indirect calls much shorter.
|
|
#define FUNCTION(sig_index, external) kDeclFunctionImport, SIG_INDEX(sig_index)
|
|
|
|
TEST_F(WasmModuleVerifyTest, OneIndirectFunction) {
|
|
static const byte data[] = {
|
|
// sig#0 -------------------------------------------------------
|
|
kDeclSignatures, 1, 0, 0, // void -> void
|
|
// func#0 ------------------------------------------------------
|
|
kDeclFunctions, 1, FUNCTION(0, 0),
|
|
// indirect table ----------------------------------------------
|
|
kDeclFunctionTable, 1, U32V_1(0)};
|
|
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
if (result.ok()) {
|
|
EXPECT_EQ(1, result.val->signatures.size());
|
|
EXPECT_EQ(1, result.val->functions.size());
|
|
EXPECT_EQ(1, result.val->function_table.size());
|
|
EXPECT_EQ(0, result.val->function_table[0]);
|
|
}
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, MultipleIndirectFunctions) {
|
|
static const byte data[] = {
|
|
// sig#0 -------------------------------------------------------
|
|
kDeclSignatures, 2, 0, 0, // void -> void
|
|
0, kLocalI32, // void -> i32
|
|
// func#0 ------------------------------------------------------
|
|
kDeclFunctions, 4, FUNCTION(0, 1), // --
|
|
FUNCTION(1, 1), // --
|
|
FUNCTION(0, 1), // --
|
|
FUNCTION(1, 1), // --
|
|
// indirect table ----------------------------------------------
|
|
kDeclFunctionTable, 8,
|
|
U32V_1(0), // --
|
|
U32V_1(1), // --
|
|
U32V_1(2), // --
|
|
U32V_1(3), // --
|
|
U32V_1(0), // --
|
|
U32V_1(1), // --
|
|
U32V_1(2), // --
|
|
U32V_1(3), // --
|
|
};
|
|
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
if (result.ok()) {
|
|
EXPECT_EQ(2, result.val->signatures.size());
|
|
EXPECT_EQ(4, result.val->functions.size());
|
|
EXPECT_EQ(8, result.val->function_table.size());
|
|
for (int i = 0; i < 8; i++) {
|
|
EXPECT_EQ(i & 3, result.val->function_table[i]);
|
|
}
|
|
}
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, IndirectFunctionNoFunctions) {
|
|
static const byte data[] = {
|
|
// sig#0 -------------------------------------------------------
|
|
kDeclSignatures, 1, 0, 0, // void -> void
|
|
// indirect table ----------------------------------------------
|
|
kDeclFunctionTable, 1, 0, 0,
|
|
};
|
|
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
|
|
TEST_F(WasmModuleVerifyTest, IndirectFunctionInvalidIndex) {
|
|
static const byte data[] = {
|
|
// sig#0 -------------------------------------------------------
|
|
kDeclSignatures, 1, 0, 0, // void -> void
|
|
// functions ---------------------------------------------------
|
|
kDeclFunctions, 1, FUNCTION(0, 1),
|
|
// indirect table ----------------------------------------------
|
|
kDeclFunctionTable, 1, 1, 0,
|
|
};
|
|
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
|
|
class WasmSignatureDecodeTest : public TestWithZone {};
|
|
|
|
|
|
TEST_F(WasmSignatureDecodeTest, Ok_v_v) {
|
|
static const byte data[] = {0, 0};
|
|
Zone zone;
|
|
FunctionSig* sig =
|
|
DecodeWasmSignatureForTesting(&zone, data, data + arraysize(data));
|
|
|
|
EXPECT_TRUE(sig != nullptr);
|
|
EXPECT_EQ(0, sig->parameter_count());
|
|
EXPECT_EQ(0, sig->return_count());
|
|
}
|
|
|
|
|
|
TEST_F(WasmSignatureDecodeTest, Ok_t_v) {
|
|
for (size_t i = 0; i < arraysize(kLocalTypes); i++) {
|
|
LocalTypePair ret_type = kLocalTypes[i];
|
|
const byte data[] = {0, ret_type.code};
|
|
FunctionSig* sig =
|
|
DecodeWasmSignatureForTesting(zone(), data, data + arraysize(data));
|
|
|
|
EXPECT_TRUE(sig != nullptr);
|
|
EXPECT_EQ(0, sig->parameter_count());
|
|
EXPECT_EQ(1, sig->return_count());
|
|
EXPECT_EQ(ret_type.type, sig->GetReturn());
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(WasmSignatureDecodeTest, Ok_v_t) {
|
|
for (size_t i = 0; i < arraysize(kLocalTypes); i++) {
|
|
LocalTypePair param_type = kLocalTypes[i];
|
|
const byte data[] = {1, 0, param_type.code};
|
|
FunctionSig* sig =
|
|
DecodeWasmSignatureForTesting(zone(), data, data + arraysize(data));
|
|
|
|
EXPECT_TRUE(sig != nullptr);
|
|
EXPECT_EQ(1, sig->parameter_count());
|
|
EXPECT_EQ(0, sig->return_count());
|
|
EXPECT_EQ(param_type.type, sig->GetParam(0));
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(WasmSignatureDecodeTest, Ok_t_t) {
|
|
for (size_t i = 0; i < arraysize(kLocalTypes); i++) {
|
|
LocalTypePair ret_type = kLocalTypes[i];
|
|
for (size_t j = 0; j < arraysize(kLocalTypes); j++) {
|
|
LocalTypePair param_type = kLocalTypes[j];
|
|
const byte data[] = {1, // param count
|
|
ret_type.code, // ret
|
|
param_type.code}; // param
|
|
FunctionSig* sig =
|
|
DecodeWasmSignatureForTesting(zone(), data, data + arraysize(data));
|
|
|
|
EXPECT_TRUE(sig != nullptr);
|
|
EXPECT_EQ(1, sig->parameter_count());
|
|
EXPECT_EQ(1, sig->return_count());
|
|
EXPECT_EQ(param_type.type, sig->GetParam(0));
|
|
EXPECT_EQ(ret_type.type, sig->GetReturn());
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(WasmSignatureDecodeTest, Ok_i_tt) {
|
|
for (size_t i = 0; i < arraysize(kLocalTypes); i++) {
|
|
LocalTypePair p0_type = kLocalTypes[i];
|
|
for (size_t j = 0; j < arraysize(kLocalTypes); j++) {
|
|
LocalTypePair p1_type = kLocalTypes[j];
|
|
const byte data[] = {2, // param count
|
|
kLocalI32, // ret
|
|
p0_type.code, // p0
|
|
p1_type.code}; // p1
|
|
FunctionSig* sig =
|
|
DecodeWasmSignatureForTesting(zone(), data, data + arraysize(data));
|
|
|
|
EXPECT_TRUE(sig != nullptr);
|
|
EXPECT_EQ(2, sig->parameter_count());
|
|
EXPECT_EQ(1, sig->return_count());
|
|
EXPECT_EQ(p0_type.type, sig->GetParam(0));
|
|
EXPECT_EQ(p1_type.type, sig->GetParam(1));
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(WasmSignatureDecodeTest, Fail_off_end) {
|
|
byte data[256];
|
|
for (int p = 0; p <= 255; p = p + 1 + p * 3) {
|
|
for (int i = 0; i <= p; i++) data[i] = kLocalI32;
|
|
data[0] = static_cast<byte>(p);
|
|
|
|
for (int i = 0; i < p + 1; i++) {
|
|
// Should fall off the end for all signatures.
|
|
FunctionSig* sig = DecodeWasmSignatureForTesting(zone(), data, data + i);
|
|
EXPECT_EQ(nullptr, sig);
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(WasmSignatureDecodeTest, Fail_invalid_type) {
|
|
byte kInvalidType = 76;
|
|
for (int i = 1; i < 3; i++) {
|
|
byte data[] = {2, kLocalI32, kLocalI32, kLocalI32};
|
|
data[i] = kInvalidType;
|
|
FunctionSig* sig =
|
|
DecodeWasmSignatureForTesting(zone(), data, data + arraysize(data));
|
|
EXPECT_EQ(nullptr, sig);
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(WasmSignatureDecodeTest, Fail_invalid_param_type) {
|
|
static const int kParamCount = 3;
|
|
for (int i = 0; i < kParamCount; i++) {
|
|
byte data[] = {kParamCount, kLocalI32, kLocalI32, kLocalI32, kLocalI32};
|
|
data[i + 2] = kLocalVoid;
|
|
FunctionSig* sig =
|
|
DecodeWasmSignatureForTesting(zone(), data, data + arraysize(data));
|
|
EXPECT_EQ(nullptr, sig);
|
|
}
|
|
}
|
|
|
|
|
|
class WasmFunctionVerifyTest : public TestWithZone {};
|
|
|
|
|
|
TEST_F(WasmFunctionVerifyTest, Ok_v_v_empty) {
|
|
static const byte data[] = {
|
|
0, kLocalVoid, // signature
|
|
4, // locals
|
|
3, kLocalI32, // --
|
|
4, kLocalI64, // --
|
|
5, kLocalF32, // --
|
|
6, kLocalF64, // --
|
|
kExprNop // body
|
|
};
|
|
|
|
FunctionResult result = DecodeWasmFunction(nullptr, zone(), nullptr, data,
|
|
data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
|
|
if (result.val && result.ok()) {
|
|
WasmFunction* function = result.val;
|
|
EXPECT_EQ(0, function->sig->parameter_count());
|
|
EXPECT_EQ(0, function->sig->return_count());
|
|
EXPECT_EQ(0, function->name_offset);
|
|
EXPECT_EQ(2, function->code_start_offset);
|
|
EXPECT_EQ(arraysize(data), function->code_end_offset);
|
|
// TODO(titzer): verify encoding of local declarations
|
|
EXPECT_FALSE(function->external);
|
|
EXPECT_FALSE(function->exported);
|
|
}
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, UnknownSectionNoLen) {
|
|
const byte data[] = {
|
|
kMaxModuleSectionCode, // unknown section without length.
|
|
};
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, UnknownSectionEmpty) {
|
|
for (int i = 0; i < 255 - kMaxModuleSectionCode; ++i) {
|
|
const byte data[] = {
|
|
byte(kMaxModuleSectionCode + i), 0, // empty unknown section
|
|
};
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
if (result.val) delete result.val;
|
|
}
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, UnknownSectionOne) {
|
|
static const byte data[] = {
|
|
kMaxModuleSectionCode,
|
|
1, // LEB128 1
|
|
0, // one byte section
|
|
};
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, UnknownSectionTen) {
|
|
static const byte data[] = {
|
|
kMaxModuleSectionCode,
|
|
10, // LEB128 10
|
|
1,
|
|
2,
|
|
3,
|
|
4,
|
|
5,
|
|
6,
|
|
7,
|
|
8,
|
|
9,
|
|
10, // 10 byte section
|
|
};
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, UnknownSectionOverflow) {
|
|
static const byte data[] = {
|
|
kMaxModuleSectionCode,
|
|
11, // LEB128 11
|
|
1,
|
|
2,
|
|
3,
|
|
4,
|
|
5,
|
|
6,
|
|
7,
|
|
8,
|
|
9,
|
|
10, // 10 byte section
|
|
};
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, UnknownSectionUnderflow) {
|
|
static const byte data[] = {
|
|
kMaxModuleSectionCode,
|
|
0xff,
|
|
0xff,
|
|
0xff,
|
|
0xff,
|
|
0x0f, // LEB128 0xffffffff
|
|
1,
|
|
2,
|
|
3,
|
|
4, // 4 byte section
|
|
};
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, UnknownSectionLoop) {
|
|
// Would infinite loop decoding if wrapping and allowed.
|
|
static const byte data[] = {
|
|
kMaxModuleSectionCode,
|
|
0xfa,
|
|
0xff,
|
|
0xff,
|
|
0xff,
|
|
0x0f, // LEB128 0xfffffffa
|
|
1,
|
|
2,
|
|
3,
|
|
4, // 4 byte section
|
|
};
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, UnknownSectionSkipped) {
|
|
static const byte data[] = {
|
|
kMaxModuleSectionCode,
|
|
1, // LEB128 1
|
|
0, // one byte section
|
|
kDeclGlobals,
|
|
1,
|
|
0, // name length
|
|
kMemI32, // memory type
|
|
0, // exported
|
|
};
|
|
ModuleResult result = DecodeModule(data, data + arraysize(data));
|
|
EXPECT_TRUE(result.ok());
|
|
|
|
EXPECT_EQ(1, result.val->globals.size());
|
|
EXPECT_EQ(0, result.val->functions.size());
|
|
EXPECT_EQ(0, result.val->data_segments.size());
|
|
|
|
WasmGlobal* global = &result.val->globals.back();
|
|
|
|
EXPECT_EQ(0, global->name_length);
|
|
EXPECT_EQ(MachineType::Int32(), global->type);
|
|
EXPECT_EQ(0, global->offset);
|
|
EXPECT_FALSE(global->exported);
|
|
|
|
if (result.val) delete result.val;
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ImportTable_empty) {
|
|
static const byte data[] = {kDeclSignatures, 0, kDeclImportTable, 0};
|
|
EXPECT_VERIFIES(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ImportTable_nosigs) {
|
|
static const byte data[] = {kDeclImportTable, 0};
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ImportTable_invalid_sig) {
|
|
static const byte data[] = {
|
|
kDeclSignatures, 0, kDeclImportTable, 1,
|
|
IMPORT_SIG_INDEX(0), // sig index
|
|
NAME_LENGTH(1), 'm', // module name
|
|
NAME_LENGTH(1), 'f', // function name
|
|
};
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ImportTable_one_sig) {
|
|
static const byte data[] = {
|
|
kDeclSignatures,
|
|
1,
|
|
VOID_VOID_SIG,
|
|
kDeclImportTable,
|
|
1, // --
|
|
IMPORT_SIG_INDEX(0), // sig index
|
|
NAME_LENGTH(1), 'm', // module name
|
|
NAME_LENGTH(1), 'f', // function name
|
|
};
|
|
EXPECT_VERIFIES(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ImportTable_invalid_module) {
|
|
static const byte data[] = {
|
|
kDeclSignatures,
|
|
1,
|
|
VOID_VOID_SIG,
|
|
kDeclImportTable,
|
|
1, // --
|
|
IMPORT_SIG_INDEX(0), // sig index
|
|
NO_NAME, // module name
|
|
NAME_LENGTH(1), 'f' // function name
|
|
};
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ImportTable_off_end) {
|
|
static const byte data[] = {
|
|
kDeclSignatures, 1, VOID_VOID_SIG, kDeclImportTable, 1,
|
|
IMPORT_SIG_INDEX(0), // sig index
|
|
NAME_LENGTH(1), 'm', // module name
|
|
NAME_LENGTH(1), 'f', // function name
|
|
};
|
|
|
|
EXPECT_OFF_END_FAILURE(data, 5, sizeof(data));
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ExportTable_empty) {
|
|
static const byte data[] = {kDeclSignatures, 0, kDeclFunctions, 0,
|
|
kDeclExportTable, 0};
|
|
EXPECT_VERIFIES(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ExportTable_NoFunctions1) {
|
|
static const byte data[] = {kDeclSignatures, 0, kDeclExportTable, 0};
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ExportTable_NoFunctions2) {
|
|
static const byte data[] = {kDeclExportTable, 0};
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ExportTableOne) {
|
|
static const byte data[] = {
|
|
kDeclSignatures, 1, // sigs
|
|
VOID_VOID_SIG, // --
|
|
kDeclFunctions, 1, // functions
|
|
EMPTY_FUNCTION(0), // --
|
|
kDeclExportTable, 1, // exports
|
|
FUNC_INDEX(0), // --
|
|
NO_NAME // --
|
|
};
|
|
EXPECT_VERIFIES(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ExportTableTwo) {
|
|
static const byte data[] = {
|
|
kDeclSignatures, 1, // sigs
|
|
VOID_VOID_SIG, // --
|
|
kDeclFunctions, 1, // functions
|
|
EMPTY_FUNCTION(0), // --
|
|
kDeclExportTable, 2, // exports
|
|
FUNC_INDEX(0), // --
|
|
NAME_LENGTH(4), 'n', 'a', 'm', 'e', // --
|
|
FUNC_INDEX(0), // --
|
|
NAME_LENGTH(3), 'n', 'o', 'm' // --
|
|
};
|
|
EXPECT_VERIFIES(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ExportTableThree) {
|
|
static const byte data[] = {
|
|
kDeclSignatures, 1, // sigs
|
|
VOID_VOID_SIG, // --
|
|
kDeclFunctions, 3, // functions
|
|
EMPTY_FUNCTION(0), // --
|
|
EMPTY_FUNCTION(0), // --
|
|
EMPTY_FUNCTION(0), // --
|
|
kDeclExportTable, 3, // exports
|
|
FUNC_INDEX(0), // --
|
|
NAME_LENGTH(1), 'a', // --
|
|
FUNC_INDEX(1), // --
|
|
NAME_LENGTH(1), 'b', // --
|
|
FUNC_INDEX(2), // --
|
|
NAME_LENGTH(1), 'c' // --
|
|
};
|
|
EXPECT_VERIFIES(data);
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ExportTableThreeOne) {
|
|
for (int i = 0; i < 6; i++) {
|
|
const byte data[] = {
|
|
kDeclSignatures, 1, // sigs
|
|
VOID_VOID_SIG, // --
|
|
kDeclFunctions, 3, // functions
|
|
EMPTY_FUNCTION(0), // --
|
|
EMPTY_FUNCTION(0), // --
|
|
EMPTY_FUNCTION(0), // --
|
|
kDeclExportTable, 1, // exports
|
|
FUNC_INDEX(i), // --
|
|
NAME_LENGTH(2), 'e', 'x', // --
|
|
};
|
|
|
|
if (i < 3) {
|
|
EXPECT_VERIFIES(data);
|
|
} else {
|
|
EXPECT_FAILURE(data);
|
|
}
|
|
}
|
|
}
|
|
|
|
TEST_F(WasmModuleVerifyTest, ExportTableOne_off_end) {
|
|
static const byte data[] = {
|
|
kDeclSignatures, 1, // sigs
|
|
VOID_VOID_SIG, // --
|
|
kDeclFunctions, 1, // functions
|
|
EMPTY_FUNCTION(0), // --
|
|
kDeclExportTable, 1, // exports
|
|
FUNC_INDEX(0), // --
|
|
NO_NAME // --
|
|
};
|
|
|
|
for (int length = 13; length < sizeof(data); length++) {
|
|
ModuleResult result = DecodeModule(data, data + length);
|
|
EXPECT_FALSE(result.ok());
|
|
if (result.val) delete result.val;
|
|
}
|
|
}
|
|
|
|
} // namespace wasm
|
|
} // namespace internal
|
|
} // namespace v8
|